CybersecurityLECET Information Technology Conference | May 2, 2012        Carrie Leary | Anne Arundel Community College
Background    AACC                   CyberWatch                  OrganizationsCenter of Academic        Advanced Technolog...
What is Cybersecurity? Defined as… Measures taken to protect a computer or computer system (as   on the Internet) agains...
What are the needs?96,600 Network & Computer System Administrators   65,700 Information Security Analysts110,000          ...
The Problem Current         IT       WorkforceWorkforce     Graduates    Needs
Identifying the Workforce Information Technology (IT)   jobs found in every industry   and across numerous job   function...
1986 - 1996
2000 - 2004
2004 - 2008
2009 - current
Why worry?Our Nation               Organizations        Individuals Loss of Intelligence    Loss of Data        Identit...
The Problem Current         IT       WorkforceWorkforce     Graduates    Needs
Avoid Weak Passwords
Accessing the Internet
Accessing the InternetChoose your browser carefully.Select Google Chrome, MozillaFirefox, of Safari if possible.Keep Web B...
Accessing the InternetDo not use unsecure WiFi.Free WiFi at Starbucks, McDonalds, etc. shouldnot be used when transmitting...
Accessing the InternetDo not use unsecure WiFi.Free WiFi at Starbucks, McDonalds, etc. shouldnot be used when transmitting...
Accessing the InternetDo not use unsecure WiFi.Free WiFi at Starbucks, McDonalds, etc. shouldnot be used when transmitting...
Accessing the InternetDo not use unsecure WiFi.Free WiFi at Starbucks, McDonalds, etc. shouldnot be used when transmitting...
Evolving Infrastructure We continue to embrace new technology     Mobile Device     Virtualization     Cloud Computing...
Be Smart with your Smartphone                                   Only connect to                                   protecte...
Cloud Computing         Built on TRUST!
Cloud Computing – Know what to askSystem Downtime     Encryption of data       Disaster Recovery   Data Retention Policy  ...
Moving Forward  Awareness and Training are essential!  Resources  • Stay Safe Online    http://www.staysafeonline.org/  • ...
Questions?Carrie Leary | csleary@aacc.edu | 410-777-7088
Resources Stay Safe Online   http://www.staysafeonline.org/ National Institute of Standards and Technology (NIST)   www....
Resources http://www.intel.com/content/www/us/en/communications/inte  rnet-minute-infographic.html http://www.confidentt...
Cybersecurity
Cybersecurity
Cybersecurity
Cybersecurity
Cybersecurity
Cybersecurity
Cybersecurity
Upcoming SlideShare
Loading in …5
×

Cybersecurity

542 views
494 views

Published on

Presented at the
LECET Information Technology Conference
Washington, DC
May 2, 2012
by Carrie S. Leary, Ann Arundel Community College

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
542
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
47
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Background about Industry
  • What is missing is a skilled competent workforce to fill all of the open job. Far more than we have applicants to pursue
  • Why do we need so many? Let’s talk about the changes that have occurred in the industry and how the landscape has changed.
  • What is missing is a skilled competent workforce to fill all of the open job. Far more than we have applicants to pursueWe are not able to develop technology as fast as neededNeed to get individual users to feel accountable and practice safe security
  • Biggest threats come from within the organization – not following polices and guidelines
  • Technology is now so accessible to so many# of connected device – storage, analytics, and security to protect against robust threats
  • What does your phone know about you? What are you giving it access to?
  • Only download apps from trusted sources, such as reputable app stores and download sites. Remember to look at the developer name, reviews, and star ratings.After clicking on a web link, pay close attention to the address to make sure it matches the website it claims to be if you are asked to enter account or login information.Set a password on your mobile device so that if it is lost or stolen, your data is difficult to access.Download a mobile security tool that scans every app you download for malware and spyware and can help you locate a lost or stolen device. For extra protection, make sure your security app can also protect from unsafe websites.Be alert for unusual behaviors on your phone, which could be a sign that it is infected. These behaviors may include unusual text messages, strange charges to the phone bill, and suddenly decreased battery life.Make sure to download firmware updates as soon as they are available for your device.
  • Handing over trustMost valuable thing to a company is their data
  • Cybersecurity

    1. 1. CybersecurityLECET Information Technology Conference | May 2, 2012 Carrie Leary | Anne Arundel Community College
    2. 2. Background AACC CyberWatch OrganizationsCenter of Academic Advanced Technological Public & Private Sectors Excellence Education Center Curriculum AAS Degree in ResearchInformation Assurance & Cybersecurity K-12 Training Training Certificates Professional Development Network Security Server Administration CISCO Networking Collegiate Cybersecurity Awareness Forensic Defense Competitions
    3. 3. What is Cybersecurity? Defined as… Measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack - Merriam-Webster The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this -Oxford Dictionaries
    4. 4. What are the needs?96,600 Network & Computer System Administrators 65,700 Information Security Analysts110,000 Computer Support Specialists 120,000 Computer Systems Analysts Bureau of Labor Statistics | Employment Change 2010 - 2020
    5. 5. The Problem Current IT WorkforceWorkforce Graduates Needs
    6. 6. Identifying the Workforce Information Technology (IT) jobs found in every industry and across numerous job functions Lack of job training and skills Pending baby boom retirements Lack of interest in STEM fields Lack career info
    7. 7. 1986 - 1996
    8. 8. 2000 - 2004
    9. 9. 2004 - 2008
    10. 10. 2009 - current
    11. 11. Why worry?Our Nation Organizations Individuals Loss of Intelligence  Loss of Data  Identity Theft Critical  Reduced  Financial Loss Infrastructure/ Productivity  Inconvenience Power Grid  Financial Loss  Loss of Trust by Customers  Bankruptcy
    12. 12. The Problem Current IT WorkforceWorkforce Graduates Needs
    13. 13. Avoid Weak Passwords
    14. 14. Accessing the Internet
    15. 15. Accessing the InternetChoose your browser carefully.Select Google Chrome, MozillaFirefox, of Safari if possible.Keep Web Browser up-to-date.Install patches as they are releasedUse secure websites.Look for “https” when transmittingconfidential information.Never click links.Always type the web addressdirectly into the address bar.
    16. 16. Accessing the InternetDo not use unsecure WiFi.Free WiFi at Starbucks, McDonalds, etc. shouldnot be used when transmitting confidentialinformation.Password protect your home WiFiPassword protecting decreased the number ofunauthorized users on your connection.Do not broadcast the SSID of your home WiFi.Hiding the name of your network decreases thenumber of unauthorized users on your connectionBe careful when selecting and answering PasswordRecovery Questions.Do not select questions that others know theanswer to or can utilize social engineering todetermine.
    17. 17. Accessing the InternetDo not use unsecure WiFi.Free WiFi at Starbucks, McDonalds, etc. shouldnot be used when transmitting confidentialinformation.Password protect your home WiFiPassword protecting decreased the number ofunauthorized users on your connection.Do not broadcast the SSID of your home WiFi.Hiding the name of your network decreases thenumber of unauthorized users on your connectionBe careful when selecting and answering PasswordRecovery Questions.Do not select questions that others know theanswer to or can utilize social engineering todetermine.
    18. 18. Accessing the InternetDo not use unsecure WiFi.Free WiFi at Starbucks, McDonalds, etc. shouldnot be used when transmitting confidentialinformation.Password protect your home WiFiPassword protecting decreased the number ofunauthorized users on your connection.Do not broadcast the SSID of your home WiFi.Hiding the name of your network decreases thenumber of unauthorized users on your connectionBe careful when selecting and answering PasswordRecovery Questions.Do not select questions that others know theanswer to or can utilize social engineering todetermine.
    19. 19. Accessing the InternetDo not use unsecure WiFi.Free WiFi at Starbucks, McDonalds, etc. shouldnot be used when transmitting confidentialinformation.Password protect your home WiFiPassword protecting decreased the number ofunauthorized users on your connection.Do not broadcast the SSID of your home WiFi.Hiding the name of your network decreases thenumber of unauthorized users on your connectionBe careful when selecting and answering PasswordRecovery Questions.Do not select questions that others know theanswer to or can utilize social engineering todetermine.
    20. 20. Evolving Infrastructure We continue to embrace new technology  Mobile Device  Virtualization  Cloud Computing Need a workforce versed in specific technical knowledgeAs the number of the need for data security to defend storage needs willconnected devices analytics will against robust threats increase, increases increase, and will be essential
    21. 21. Be Smart with your Smartphone Only connect to protected WiFi Be vigilant when clicking web links Use a complex password Keep firmware updated Only download apps from trusted sources Pay attention to the data the phone is accessing
    22. 22. Cloud Computing Built on TRUST!
    23. 23. Cloud Computing – Know what to askSystem Downtime Encryption of data Disaster Recovery Data Retention Policy (in transit and at rest) Plan Data Integrity Identity and Access Regulatory Location of Data Assurance Management Compliance Centers/ Physical Security
    24. 24. Moving Forward Awareness and Training are essential! Resources • Stay Safe Online http://www.staysafeonline.org/ • National Institute of Standards and Technology (NIST) www.nist.gov • National Initiative for Cybersecurity Education (NICE)http://csrc.nist.gov/nice/ • CyberWatch ATE Center www.cyberwatchcenter.org • Cyber Maryland http://www.cybermaryland.org/
    25. 25. Questions?Carrie Leary | csleary@aacc.edu | 410-777-7088
    26. 26. Resources Stay Safe Online http://www.staysafeonline.org/ National Institute of Standards and Technology (NIST) www.nist.gov National Initiative for Cybersecurity Education (NICE) http://csrc.nist.gov/nice/ CyberWatch www.cyberwatchcenter.org Cyber Maryland http://www.cybermaryland.org/
    27. 27. Resources http://www.intel.com/content/www/us/en/communications/inte rnet-minute-infographic.html http://www.confidenttechnologies.com/infographic http://www.makeuseof.com/tech-fun/the-only-thing-internet- explorer-is-good-for/

    ×